×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [1]
西安交通大学 [1]
大连理工大学 [1]
兰州大学 [1]
中国科学院大学 [1]
山东大学 [1]
更多...
内容类型
期刊论文 [6]
会议论文 [2]
发表日期
2019 [1]
2015 [1]
2013 [1]
2010 [2]
2007 [1]
2006 [1]
更多...
学科主题
Engineerin... [1]
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共8条,第1-8条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 页码: 878-890
作者:
Zhang, Jie
;
Huang, Xin
;
Wang, Wei
;
Yue, Yong
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/11/19
Authenticated key exchange (AKE)
unbalanced computational requirements
identity-based (ID-based) cryptography
disaster scenarios
pairing-free
An Id-Based Server-Aided Designcryption Signcryption Scheme
会议论文
8th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, PEOPLES R CHINA, 2015-01-01
作者:
Lan, Caihui
;
Li, Haifeng
;
Wang, Caifen
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/09
Signcryption
Id-Based Cryptography
Server-Aided Designcryption
the Random Oracle
An ID-based certified e-mail protocol with STTP suitable for wireless mobile environments
期刊论文
Journal of Computers, 2013, 卷号: 8, 期号: 1, 页码: 3-9
作者:
Wang, Caifen
;
Lan, Caihui
;
Niu, Shufen
;
Cao, Xiaojun
;
Gong, Minan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2016/07/15
Certification process
Certified e-mail
Communication cost
Fair exchange
ID-based
ID-based cryptography
Id-based public key cryptographies
Identity-based signcryption
Public key authentication
Re-encryption
Semi-trusted third parties
Signcryption
Trusted third parties
Wireless mobile environments
IDENTITY-BASED FORWARD SECURE THRESHOLD SIGNATURE SCHEME BASED ON MEDIATED RSA
期刊论文
International Journal of Computers & Applications, 2010, 卷号: 32, 期号: 4, 页码: 469-475
作者:
Jia Yu
;
Rong Hao
;
Fanyu Kong
;
Xiangguo Cheng
;
Huawei Zhao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/26
forward security
digital signature
ID-based cryptography
mediated RSA
Provably secure partially blind signature without trusted PKG
期刊论文
Tongxin Xuebao/Journal on Communications, 2010, 卷号: 31, 期号: 1, 页码: 128-134
作者:
Feng, Tao
;
Peng, Wei
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Public key cryptography
Bilinear pairing
Computational diffie-hellman problems
Gap Diffie-Hellman groups
ID based signature
Key escrow
Partially blind signature scheme
Partially blind signatures
Private key generators
Id-based fair off-line electronic cash system with multiple banks
期刊论文
Journal of computer science and technology, 2007, 卷号: 22, 期号: 3, 页码: 487-493
作者:
Wang, Chang-Ji
;
Tang, Yong
;
Li, Qing
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/05/10
Electronic cash
Restrictive partially blind signature
Id-based cryptography
Cryptanalysis of two signature schemes based on bilinear pairings in CISC '05
会议论文
2nd SKLOIS Conference on Information Security and Cryptology, 2006-11-29
作者:
Park, Haeryong[1]
;
Cao, Zhengjun[2]
;
Liu, Lihua[3]
;
Lim, Seongan[4]
;
Yie, Ikkwon[5]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/05/10
bilinear pairing
group signature
ID-based cryptography
verifiably encrypted signature
id-based designated-verifier proxy signatures
期刊论文
IEE PROCEEDINGS-COMMUNICATIONS, 2005, 卷号: 152, 期号: 6, 页码: 989-994
Cao T
;
Lin D
;
Xue R
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2011/07/28
ID-based DVPS
designated-verifier proxy signature
public verifiable signature
security property
strong DVPS
universal DVPS
weak DVPS
cryptography
digital signatures
telecommunication security
©版权所有 ©2017 CSpace - Powered by
CSpace